Lily has cultivated a distinguished career of over 15 years, marked by her commitment to excellence in client delivery.
One of Lily’s pivotal roles involves leading a team responsible for providing security risk assessments, a critical component in Kroll's Proactive Cybersecurity practice. She is also instrumental in supporting the CFIUS team in executing national security audits, underscoring her dedication to collaboration across teams.
Embracing a hands-off approach to leadership, Lily provides her team the autonomy to excel while ensuring a supportive environment where collaboration thrives. Her leadership philosophy places a premium on empowering individuals to contribute their unique skills and perspectives, fostering innovation and excellence within the team.
A dedicated advocate for client education, Lily’s responsibilities extend to delivering security awareness training to clients, where she shares industry best practices and ensures clients possess the knowledge required to navigate an ever-evolving threat landscape.
Prior to joining Kroll, Lily led the Threat Management Team at Community Health Systems, where her team was responsible for all security tooling and for supporting the Security Operations Center. Her experience with health care security and HIPAA compliance allows her to provide clients with industry-leading support in keeping patients’ sensitive information safe.
As a trans woman, Lily is dedicated not only to her professional endeavors but also to promoting visibility and acceptance of trans and non-binary individuals in the workplace and beyond. Through her leadership, she embodies inclusivity and works to foster an environment, where all individuals feel valued and respected.
Lily’s experience extends across diverse industries, allowing her to tailor security solutions to meet the unique needs of each client. Lily holds recognized industry certifications, including CISSP and GXPEN. The ability to navigate complex security challenges with a strategic and client-focused approach sets her apart in the cybersecurity landscape.